PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47935 Sentry CVE debrief

CVE-2021-47935 is an authenticated remote code execution issue in Sentry’s audit-log handling. According to the supplied record, a superuser can submit crafted POST requests to the admin audit log endpoint with malicious pickle-serialized content in the data parameter and achieve command execution with application privileges.

Vendor
Sentry
Product
Unknown
CVSS
HIGH 8.7
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-10
Original CVE updated
2026-05-10
Advisory published
2026-05-10
Advisory updated
2026-05-10

Who should care

Sentry administrators, security teams, and operators of deployments that expose admin interfaces or retain superuser accounts should treat this as a high-priority application-layer risk.

Technical summary

The supplied CVE description says Sentry 8.2.0 processes attacker-controlled audit-log data in a way that permits pickle deserialization of crafted objects. Because the attacker must be an authenticated superuser, the issue is not a pure unauthenticated remote exploit, but the impact is still severe: arbitrary command execution in the application context. The NVD metadata supplied with the record maps the issue to CWE-94 and gives a high-severity CVSS v4.0 vector with network attack access and low privileges required.

Defensive priority

High. The combination of authenticated access, code execution, and application-privilege impact warrants prompt review of exposed Sentry instances and privileged account controls.

Recommended defensive actions

  • Confirm whether any deployed Sentry instances fall within the affected version range described in the CVE record.
  • Apply the vendor’s remediation or upgrade to a non-vulnerable release once confirmed by official guidance.
  • Restrict and audit superuser access to Sentry admin functions, especially audit-log endpoints.
  • Monitor for unusual POST activity and suspicious base64/compressed payloads in audit-log data handling.
  • Review application logs and administrative actions for signs of abuse, and rotate credentials or secrets if compromise is suspected.

Evidence notes

This debrief is based on the supplied CVE description and the official NVD/CVE records included in the source corpus. The record attributes the issue to CWE-94 and includes a high-severity CVSS v4.0 vector. The supplied enrichment does not list a CISA KEV entry. Vendor confidence is low in the provided metadata, so the Sentry attribution should be treated as needing review against vendor guidance.

Official resources

The supplied record shows CVE-2021-47935 published and modified on 2026-05-10. NVD status is 'Received,' and no KEV entry is listed in the provided enrichment.